Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    A Deep Learning Hierarchical Ensemble for Remote Sensing Image Classification

    Seung-Yeon Hwang1, Jeong-Joon Kim2,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2649-2663, 2022, DOI:10.32604/cmc.2022.022593

    Abstract Artificial intelligence, which has recently emerged with the rapid development of information technology, is drawing attention as a tool for solving various problems demanded by society and industry. In particular, convolutional neural networks (CNNs), a type of deep learning technology, are highlighted in computer vision fields, such as image classification and recognition and object tracking. Training these CNN models requires a large amount of data, and a lack of data can lead to performance degradation problems due to overfitting. As CNN architecture development and optimization studies become active, ensemble techniques have emerged to perform image classification by combining features extracted… More >

  • Open Access

    ARTICLE

    Sign Language to Sentence Formation: A Real Time Solution for Deaf People

    Muhammad Sanaullah1,*, Muhammad Kashif2, Babar Ahmad2, Tauqeer Safdar2, Mehdi Hassan3, Mohd Hilmi Hasan4, Amir Haider5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2501-2519, 2022, DOI:10.32604/cmc.2022.021990

    Abstract Communication is a basic need of every human being to exchange thoughts and interact with the society. Acute peoples usually confab through different spoken languages, whereas deaf people cannot do so. Therefore, the Sign Language (SL) is the communication medium of such people for their conversation and interaction with the society. The SL is expressed in terms of specific gesture for every word and a gesture is consisted in a sequence of performed signs. The acute people normally observe these signs to understand the difference between single and multiple gestures for singular and plural words respectively. The signs for singular… More >

  • Open Access

    ARTICLE

    Image Encryption Using Multi-Scroll Attractor and Chaotic Logistic Map

    R. Anitha*, B. Vijayalakshmi

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3447-3463, 2022, DOI:10.32604/cmc.2022.021519

    Abstract In the current scenario, data transmission over the network is a challenging task as there is a need for protecting sensitive data. Traditional encryption schemes are less sensitive and less complex thus prone to attacks during transmission. It has been observed that an encryption scheme using chaotic theory is more promising due to its non-linear and unpredictable behavior. Hence, proposed a novel hybrid image encryption scheme with multi-scroll attractors and quantum chaos logistic maps (MSA-QCLM). The image data is classified as inter-bits and intra-bits which are permutated separately using multi scroll attractor & quantum logistic maps to generate random keys.… More >

  • Open Access

    ARTICLE

    Thermomechanical Behavior of Brake Drums Under Extreme Braking Conditions

    T. Khatir1,2, M. Bouchetara2, K. Derrar2, M. Djafri3, S. Khatir4, M. Abdel Wahab5,6,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2259-2273, 2022, DOI:10.32604/cmc.2022.020879

    Abstract Braking efficiency is characterized by reduced braking time and distance, and therefore passenger safety depends on the design of the braking system. During the braking of a vehicle, the braking system must dissipate the kinetic energy by transforming it into heat energy. A too high temperature can lead to an almost total loss of braking efficiency. An excessive rise in brake temperature can also cause surface cracks extending to the outside edge of the drum friction surface. Heat transfer and temperature gradient, not to forget the vehicle's travel environment (high speed, heavy load, and steeply sloping road conditions), must thus… More >

  • Open Access

    ARTICLE

    Deep Learning Control for Autonomous Robot

    Rihem Farkh1,2, Saad Alhuwaimel3,*, Sultan Alzahrani3, Khaled Al Jaloud1, Mohammad Tabrez Quasim4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2811-2824, 2022, DOI:10.32604/cmc.2022.020259

    Abstract Several applications of machine learning and artificial intelligence, have acquired importance and come to the fore as a result of recent advances and improvements in these approaches. Autonomous cars are one such application. This is expected to have a significant and revolutionary influence on society. Integration with smart cities, new infrastructure and urban planning with sophisticated cyber-security are some of the current ramifications of self-driving automobiles. The autonomous automobile, often known as self-driving systems or driverless vehicles, is a vehicle that can perceive its surroundings and navigate predetermined routes without human involvement. Cars are on the verge of evolving into… More >

  • Open Access

    ARTICLE

    Efficient Deep Learning Modalities for Object Detection from Infrared Images

    Naglaa F. Soliman1,2, E. A. Alabdulkreem3, Abeer D. Algarni1,*, Ghada M. El Banby4, Fathi E. Abd El-Samie1,5, Ahmed Sedik6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2545-2563, 2022, DOI:10.32604/cmc.2022.020107

    Abstract For military warfare purposes, it is necessary to identify the type of a certain weapon through video stream tracking based on infrared (IR) video frames. Computer vision is a visual search trend that is used to identify objects in images or video frames. For military applications, drones take a main role in surveillance tasks, but they cannot be confident for long-time missions. So, there is a need for such a system, which provides a continuous surveillance task to support the drone mission. Such a system can be called a Hybrid Surveillance System (HSS). This system is based on a distributed… More >

  • Open Access

    ARTICLE

    Secret Key Optimization for Secure Speech Communications

    Osama S. Faragallah1,*, Mahmoud Farouk2, Hala S. El-Sayed3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3025-3037, 2022, DOI:10.32604/cmc.2022.019951

    Abstract This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains. The first question is, what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform domains. The second question is the relation between the number of sub-keys, the number of secret keys used, and the audio speech signal block’s size. Finally, how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform domains.… More >

  • Open Access

    ARTICLE

    Opto-Video Encryption Based on Logistic Adjusted Sine map in FrFT

    Osama S. Faragallah1,*, Ashraf Afifi1, Ibrahim F. Elashry2, Ensherah A. Naeem3, Heba M. El-Hoseny4, Ahmed I. Sallam5, Hala S. El-sayed6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3651-3663, 2022, DOI:10.32604/cmc.2022.019827

    Abstract In the last few years, videos became the most common form of information transmitted over the internet, and a lot of the traffic is confidential and must be protected and delivered safely to its intended users. This introduces the challenges of presenting encryption systems that can encode videos securely and efficiently at the same time. This paper presents an efficient opto-video encryption system using Logistic Adjusted Sine map (LASM) in the Fractional Fourier Transform (FrFT). In the presented opto-video LASM-based FrFT scheme, the encoded video is split into distinct frames and transformed into optical signals utilizing an optical supply. Each… More >

  • Open Access

    ARTICLE

    Metaheuristics Algorithm for Tuning of PID Controller of Mobile Robot System

    Harsh Goud1, Prakash Chandra Sharma2, Kashif Nisar3,7,*, Muhammad Reazul Haque4, Ag. Asri Ag. Ibrahim3, Narendra Singh Yadav2, Pankaj Swarnkar5, Manoj Gupta6, Laxmi Chand6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3481-3492, 2022, DOI:10.32604/cmc.2022.019764

    Abstract Robots in the medical industry are becoming more common in daily life because of various advantages such as quick response, less human interference, high dependability, improved hygiene, and reduced aging effects. That is why, in recent years, robotic aid has emerged as a blossoming solution to many challenges in the medical industry. In this manuscript, meta-heuristics (MH) algorithms, specifically the Firefly Algorithm (FF) and Genetic Algorithm (GA), are applied to tune PID controller constraints such as Proportional gain Kp Integral gain Ki and Derivative gain Kd. The controller is used to control Mobile Robot System (MRS) at the required set… More >

  • Open Access

    ARTICLE

    Finger Vein Authentication Based on Wavelet Scattering Networks

    Amjad Rehman1, Majid Harouni2,*, Maedeh Omidiravesh3, Suliman Mohamed Fati1, Saeed Ali Bahaj4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3369-3383, 2022, DOI:10.32604/cmc.2022.016410

    Abstract Biometric-based authentication systems have attracted more attention than traditional authentication techniques such as passwords in the last two decades. Multiple biometrics such as fingerprint, palm, iris, palm vein and finger vein and other biometrics have been introduced. One of the challenges in biometrics is physical injury. Biometric of finger vein is of the biometrics least exposed to physical damage. Numerous methods have been proposed for authentication with the help of this biometric that suffer from weaknesses such as high computational complexity and low identification rate. This paper presents a novel method of scattering wavelet-based identity identification. Scattering wavelet extracts image… More >

Displaying 8721-8730 on page 873 of 22233. Per Page